바이너리 기반 소프트웨어 유사도 분석 도구

  • Published : 2016.01.18

Abstract

Keywords

References

  1. BSA Global Report Study in Brief, http://globalstudy.bsa.org/2011/downloads/study_pdf/2011_BSA_Piracy_ Study-InBrief.pdf
  2. The Economic Impact of Properly Licensed Software, http://portal.bsa.org/insead/assets/studies/2013softwarevaluestudy_en.pdf
  3. B. Baker, "On finding duplication and near-duplication in large software systems", In Proceedings of WCRE 1995.
  4. S. Ducasse, M. Rieger, S. Demeyer, "A language independent approach for detecting duplicated code", In Proceeding of lCSM 1999.
  5. U. Manber, "Finding similar files in a large file system", In Proceeding of USENIX Winter Conf, 1994.
  6. T. Kamiya, S. Kusumoto, K. Inoue, "CCFinder: A multilinguistic token-based code clone detection system for large scale source code", IEEE Transactions on Software Engineering 28(7), 2002.
  7. Z. Li, S. Lu, S. Myagmar, and Y. Zhou, "Cp-miner: Finding copy-paste and related bugs in large-scale software code", IEEE Transactions on Software Engineering, 32(3),2006.
  8. I. Baxter, A. Yahin, L. Moura, M. Anna, "Clone detection using abstract syntax trees", In Proceeding of iCSM 1998.
  9. L. Jiang, G. Misherghi, Z. Su, S. Glondu, "DECKARD: Scalable and accurate tree-based detection of code clones", In Proceedings of iCSE 2007.
  10. R. Komondoor, S. Horwitz, "Using slicing to identify duplication in source code", In Proceedings of SAS 2001.
  11. M. Gabel, L. Jiang, and Z. Su, "Scalable detection of semantic clones", In Proceeding of iCSE, 2008.
  12. C. Liu, C. Chen, J. Han, and P.S. Yu, "GPlag: detection of software plagiarism by program dependence graph analysis", In proceeding of KDD, 2006.
  13. X. Wang, Y. -C. Jhi, S. Zhu, and P. Liu, "Behavior based software theft detection," In Proceeding of CCS, 2009.
  14. J. Jang and D. Brumley, "BitShred: Fast, Scalable Code Reuse Detection in Binary Code", CMU-CyLab-10-006, 2009.
  15. Y. Dang, R. Wu, H. Zhang, D. Zhang, and P. Nobel, "ReBucket: A method for clustering duplicate crash reports based on call stack similarity", In Proceeding of ICSE 2012.
  16. S. Han, Y. Dang, S. Ge, D. Zhang, and T. Xie, "Performance debugging in the large via mining millions of stack traces," In Proceeding of iCSE, 2012.
  17. Y.-C. Jhi, X. Wang, X. Jia, S. Zhu, P. Liu, and D, Wu, "Value-based program characterization and its application to software plagiarism detection", In Proceeding of iCSE 2011.
  18. H. Kim, Y. Jung, S. Kim and K. Yi, "MeCC: Memory Comparison based Clone Detector", In Proceeding of ICSE, 2011.
  19. CREST Project Page, http://code.google.com/p/crest
  20. C. Cadar, D. Dunbar, and D. Engler, "Klee: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs", In Proceedings of OSDI, 2008.
  21. Y Choi, "Prism: Semantic Units Clustering and Memory Context Techniques for Binary-level Software Similarity Analysis and Plagiarism Detection", Ph.D. Dissertation, Dankook University, 2013.
  22. S. Schleimer, D. S. Wilkerson, and A. Aiken, "Winnowing: local algorithms for document fingerprinting", In Proceeding of SIGMOD, 2003.